-
1
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography.
-
-
Menezes, A.1
Oorschot, P.2
Vanstone, S.3
-
2
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749-761 (2004)
-
(2004)
Chaos Solitons Fractals
, vol.21
, Issue.3
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.3
-
3
-
-
78049452836
-
A chaotic image encryption algorithm based on perceptron model
-
Wang, X., Yang, L., Liu, R.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62, 615-621 (2010)
-
(2010)
Nonlinear Dyn.
, vol.62
, pp. 615-621
-
-
Wang, X.1
Yang, L.2
Liu, R.3
-
4
-
-
79952007772
-
Chaotic encryption algorithm based on alternant of stream cipher and block cipher
-
Wang, X., Wang, X., Zhao, J.: Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn. 63, 587-597 (2011)
-
(2011)
Nonlinear Dyn.
, vol.63
, pp. 587-597
-
-
Wang, X.1
Wang, X.2
Zhao, J.3
-
5
-
-
79959528048
-
A speech encryption using fractional chaotic systems
-
Jye, S.: A speech encryption using fractional chaotic systems. Nonlinear Dyn. 65, 103-108 (2011)
-
(2011)
Nonlinear Dyn.
, vol.65
, pp. 103-108
-
-
Jye, S.1
-
6
-
-
59949096428
-
A block cipher with dynamic S-boxes based on tent map
-
Wang, Y., Wong, K., Liao, X., Xiang, T.: A block cipher with dynamic S-boxes based on tent map. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3089-3099 (2009)
-
(2009)
Commun. Nonlinear Sci. Numer. Simul.
, vol.14
, Issue.7
, pp. 3089-3099
-
-
Wang, Y.1
Wong, K.2
Liao, X.3
Xiang, T.4
-
7
-
-
33747348397
-
An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
-
DOI 10.1016/j.chaos.2005.10.022, PII S0960077905009604
-
Chen, G., Chen, Y., Liao, X.: An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps. Chaos Solitons Fractals 31(3), 571-579 (2007) (Pubitemid 44247626)
-
(2007)
Chaos, Solitons and Fractals
, vol.31
, Issue.3
, pp. 571-579
-
-
Chen, G.1
Chen, Y.2
Liao, X.3
-
8
-
-
77949485060
-
A chaos-based hash function with both modification detection and localization capabilities
-
Xiao, D., Shih, F., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254-2261 (2010)
-
(2010)
Commun. Nonlinear Sci. Numer. Simul.
, vol.15
, Issue.9
, pp. 2254-2261
-
-
Xiao, D.1
Shih, F.2
Liao, X.3
-
9
-
-
70449124689
-
Analysis and improvement of a chaos-based Hash function construction
-
Deng, S., Li, Y., Xiao, D.: Analysis and improvement of a chaos-based Hash function construction. Commun. Nonlinear Sci. Numer. Simul. 15(5), 1338-1347 (2010)
-
(2010)
Commun. Nonlinear Sci. Numer. Simul.
, vol.15
, Issue.5
, pp. 1338-1347
-
-
Deng, S.1
Li, Y.2
Xiao, D.3
-
10
-
-
9644303109
-
One-way hash function construction based on the chaotic map with changeableparameter
-
Xiao, D., Liao, X., Deng, S.: One-way hash function construction based on the chaotic map with changeableparameter. Chaos Solitons Fractals 24(1), 65-71 (2005)
-
(2005)
Chaos Solitons Fractals
, vol.24
, Issue.1
, pp. 65-71
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
11
-
-
33751227507
-
A novel key agreement protocol based on chaotic maps
-
DOI 10.1016/j.ins.2006.07.026, PII S0020025506002246
-
Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136-1142 (2007) (Pubitemid 44791324)
-
(2007)
Information Sciences
, vol.177
, Issue.4
, pp. 1136-1142
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
12
-
-
43049150816
-
Security of a key agreement protocol based on chaotic maps
-
DOI 10.1016/j.chaos.2007.01.017, PII S0960077907000343
-
Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38(3), 764-768 (2008) (Pubitemid 351633025)
-
(2008)
Chaos, Solitons and Fractals
, vol.38
, Issue.3
, pp. 764-768
-
-
Han, S.1
-
13
-
-
64949092681
-
On the security of a novel key agreement protocol based on chaotic maps
-
Xiang, T., Wong, K., Liao, X.: On the security of a novel key agreement protocol based on chaotic maps. Chaos Solitons Fractals 40(2), 672-675 (2009)
-
(2009)
Chaos Solitons Fractals
, vol.40
, Issue.2
, pp. 672-675
-
-
Xiang, T.1
Wong, K.2
Liao, X.3
-
14
-
-
70449471727
-
A chaotic maps-based key agreement protocol that preserves user anonymity
-
Dresden, Germany
-
Tseng, H., Jan, R., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International Conference on Communications, ICC'09, Dresden, Germany, pp. 1-6 (2009)
-
(2009)
IEEE International Conference on Communications, ICC'09
, pp. 1-6
-
-
Tseng, H.1
Jan, R.2
Yang, W.3
-
15
-
-
78049382801
-
An anonymous key agreement protocol based on chaotic maps
-
Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986-1992 (2011)
-
(2011)
Commun. Nonlinear Sci. Numer. Simul.
, vol.16
, Issue.4
, pp. 1986-1992
-
-
Niu, Y.1
Wang, X.2
-
16
-
-
84861748201
-
An extended chaotic maps-based key agreement protocol with user anonymity
-
doi:10.1007/s11071-011-0247-4
-
Lee, C., Chen, C., Wu, C., Huang, S.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. (2011). doi:10.1007/s11071-011-0247-4
-
(2011)
Nonlinear Dyn.
-
-
Lee, C.1
Chen, C.2
Wu, C.3
Huang, S.4
-
17
-
-
40249103088
-
Cryptanalysis of the public key encryption based on multiple chaotic systems
-
DOI 10.1016/j.chaos.2006.09.047, PII S096007790600909X
-
Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fractals 37(3), 669-674 (2008) (Pubitemid 351335355)
-
(2008)
Chaos, Solitons and Fractals
, vol.37
, Issue.3
, pp. 669-674
-
-
Zhang, L.1
-
18
-
-
84855196010
-
Note on Design of improved password authentication and update scheme based on elliptic curve cryptography
-
He, H.,Wu, S., Chen, J.: Note on Design of improved password authentication and update scheme based on elliptic curve cryptography.Math. Comput. Model. 55(3-4), 1661-1664 (2012)
-
(2012)
Math. Comput. Model.
, vol.55
, Issue.3-4
, pp. 1661-1664
-
-
He, H.1
Wu, S.2
Chen, J.3
-
19
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Guildford, UK
-
Linnartz, J., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of the Audio-And Video-Based Person Authentication, Guildford, UK, pp. 393-402 (2003)
-
(2003)
Proceedings of the Audio-And Video-Based Person Authentication
, pp. 393-402
-
-
Linnartz, J.1
Tuyls, P.2
-
20
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, CA
-
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of Advances in Cryptology (CRYPTO 99), Santa Barbara, CA, pp. 388-397 (1999)
-
(1999)
Proceedings of Advances in Cryptology (CRYPTO 99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
21
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
Messerges, T., Dabbish, E., Sloan, R.: Examining smartcard security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541-552 (2002) (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
22
-
-
69949114528
-
Theoretical framework for constructing matching algorithms in biometric authentication systems
-
Alghero, Italy. Lecture Notes in Computer Science. Springer, Berlin
-
Inuma, M., Otsuka, A., Imai, H.: Theoretical framework for constructing matching algorithms in biometric authentication systems. In: Proc. of ICB'09, Alghero, Italy. Lecture Notes in Computer Science, vol. 5558, pp. 806-815. Springer, Berlin (2009)
-
(2009)
Proc. of ICB'09
, vol.5558
, pp. 806-815
-
-
Inuma, M.1
Otsuka, A.2
Imai, H.3
-
23
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
doi:10.1007/s10916-011-9658-5
-
He, D., Chen, J., Zhang, R.: A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. (2010). doi:10.1007/s10916-011-9658-5
-
(2010)
J. Med. Syst.
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
24
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
-
doi:10.1002/sec.506
-
He, D., Chen, J., Chen, Y.: A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Commun. Netw. (2011). doi:10.1002/sec.506
-
(2011)
Secur. Commun. Netw.
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
25
-
-
84859767453
-
An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings
-
doi:10.1016/j.adhoc. 2012.01.002
-
He, D.: An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings. Ad Hoc Netw. (2012). doi:10.1016/j.adhoc. 2012.01.002
-
(2012)
Ad Hoc Netw.
-
-
He, D.1
|